A Self-Learning Network Anomaly Detection System using Majority Voting
|
|
- Calvin Boone
- 5 years ago
- Views:
Transcription
1 A Self-Learnng Network Anomaly Detecton System usng Majorty Votng D.Hock and M.Kappes Department of Computer Scence and Engneerng, Unversty of Appled Scences, Frankfurt am Man, Germany e-mal: {dehock Abstract Network traffc s constantly changng. However, many current Intruson Detecton Systems requre somewhat statc condtons n order to work properly. In ths paper, we propose ongong tranng and updatng procedures and ntroduce a self-learnng Anomaly Detecton System based on majorty votng that can adapt to network changes by steadly exchangng small parts of tranng data. We evaluate the performance of dfferent replacement strateges for ths process. Of the evaluated replacement strateges, the replace oldest strategy archved the best results. Keywords Anomaly Detecton, Self-Learnng, Majorty Votng, Replacement Strateges 1. Introducton As shown n recent surveys, the number of threats has contnuously ncreased, along wth ther sophstcaton (Rchardson 2011). The preventon of network ntrusons and attacks s an ncreasngly mportant ssue as more and more crtcal processes and senstve data depend on network securty. One way to detect attacks early on are Intruson Detecton Systems (IDS). Krügel et al. (2005) specfed ntruson detecton as "the process of dentfyng and respondng to malcous actvtes targeted at computng and network resources". Whle tradtonal, sgnature-based IDS often lag behnd todays attacks, heurstc methods are a promsng alternatve. Heurstc technques are often clustered nto two categores, namely Msuse Detecton and Anomaly Detecton (Dokas et al. 2002). Msuse detecton recognzes threats by comparng them aganst a set of known ntrusons. Anomaly Detecton dscovers devatons from normal behavour. A major advantage of anomaly detecton s ts ablty to detect even unknown and new attacks. Msuse detecton can, lke tradtonal systems, only detect attacks whch are smlar to attacks already known (e.g., been prevously learned by the system). The common objectve of each Anomaly Detecton System s to report ntrusve actvty. However, not all anomalous actvtes are also ntrusve. A report of an anomalous, but not ntrusve actvty s called false postve. The dsadvantage of heurstc procedures, especally for anomaly detecton, are hgh false postve rates. False postves occur n partcular f new types of legtmate network traffc arse such as, e.g., the nstallaton of new dstrbuted programs, the use of new network devces or rregular backup and remote mantenance. 59
2 Proceedngs of the Tenth Internatonal Network Conference (INC2014) Actvty Descrpton Not ntrusve and not anomalous True Negatve (TN): there s no ntrusve actvty and the system does not report alerts. Intrusve and anomalous True Postve (TP): the actvty s ntrusve and s reported by the system. Intrusve but not anomalous False Negatve (FN): The system fals to detect an ntrusve actvty, because t s to smlar to the expected actvty. Not ntrusve but anomalous False Postve (FP): The actvty s not ntrusve, but dfferent from the usual actvty and reported by the system. Table 1: Defnton of possble outputs For some IDS, up to 99% of alerts can be classfed as false postves and are unrelated to network securty ssues (Petraszek 2004). Whle the false negatve rate can be mproved by combnng multple IDS, t s not possble to reduce a large number of false postves by such means. It s a tme-consumng task to dstngush between relevant and rrelevant alerts, whch means a hgh workload for securty analysts. A further problem of Anomaly Detecton s the so called concept drft (Gates and Taylor 2006), the phenomenon of unexpected change n network traffc over tme. Heurstc approaches usually have a learnng phase and a productve phase. Anomaly Detecton Systems learn the normal behavor of the network n the learnng phase, that means they derve a statstcal model, e.g., by collectng statstcs of network traffc over a perod of tme, whch can be compared later to the statstcs of the productve network traffc. Here, we refer to ths learned model as "sample". A hgh rate of false postves can have varous causes, but many can be traced back to samples of low qualty. The process of learnng the typcal network behavour can be a challengng task: If the s tranng carred out at a bad tme, the system mght not capture the complete regular behavour; f there s an attack n the sample, the system mght not be able to detect ths attack later; f the productve network s not accessble for the developer, he mght not be able to create accurate samples. However, even when the current behavour was captured perfectly, t s very lkely that the sample wll get outdated soon due to the contnuous change of network software, devces and usage. Gates et al. (2006) crtcally examned current Anomaly Detecton paradgms and dentfed these problems (summarzed as problem doman, operatonal usablty and tranng-data) as man ssues concernng todays Anomaly Detecton Systems. A possble soluton for some of these problems are IDS whch automatcally adjust wth the help of a dynamc update process to the changng network, so-called Self-Learnng Systems. Thus, the detecton model s updated so that t reflects the most recent network traffc. The contnuous manual updatng and testng by an operator would be a tme-consumng task and cannot be outsourced to a central nstance (lke for vrus scanners) as IDS updates need to be talored to the envronment they operate n and, n general, requre detaled customzaton. Thus, there s a need for methods to be able to optmze and update systems automatcally and locally. However, automatcally updatng such a system may open up new vulnerabltes f attacks are erroneously adjusted for, contamnatng the Anomaly Detecton System and preventng the detecton of such attacks (Kloft and Laskov 2007). In ths paper, we propose to solve these ssues by combnng a self-learnng approach wth majorty votng: Instead of checkng aganst a sngle model to 60
3 examne the network traffc, our approach compares the traffc to several models whch are contnuously replaced by mproved and better fttng models. At the same tme, the redundancy of our tranng data represents an advantage over nosy data and helps to stepwse replace obsolete data. The remander of the paper s organsed as follows. In the next secton, we present our method and ts features. We also outlne some detals of our update and replacement mechansms. Last but not least, we present the evaluatons of the ntroduced approach. The results nclude a comparson of performance usng dfferent replacement strateges. 2. Related Work Snce Dorothy Dennng publshed her ntal dea about Anomaly Detecton (Dennng 1987), exstng detecton mechansms have been contnuously expanded and mproved. Resultng methods nclude Outler Detecton (Dokas et al. 2002), Pattern Analyss (Km et al. 2004) and Prncpal Component Classfer (Munz and Carle 2007). However, only few of these approaches have been adopted n productve systems. Of partcular relevance to our work are methods that use multple testng and subsequent combnaton of the results and methods whch have ganed nterest especally n crowd-based mage classfcaton (Bachrach et al. 2012). Km and Bentley (2002) tested the effect of varous parameters (Sample lfe span, threshold) wth self-updatng clusterng algorthms. Cretu-Cocarle et al. (2009) used a Self-Learnng System together wth n-gram analyss and a smple votng algorthm. Our approach s smlar, but dffers n the detecton algorthm and features. Furthermore, we focused on the evaluaton of replacement strateges for automatc update mechansms. Therefore, we show more advanced strateges than full replacement. 3. Method In the followng, we wll brefly outlne the ratonale behnd our approach. Our method s based on classfyng network-traffc by assgnng a value from the range [0,1] ndcatng ts abnormalty to t. Dependng on the value and a threshold, the traffc s then classfed as normal or abnormal. Thus, f bengn and malgnant network traffc receve the same values durng tranng, the result s an area n whch we cannot dstngush whether the traffc s normal or ntrusve. In practce, not every value s equally often represented, for smplcty we assume for now that the values are normally dstrbuted for suffcently large data. Yet, the normal dstrbuton s presented merely as an llustraton, the actual dstrbuton depends of course on the feature, the user behavor and network characterstcs such as the Number of hosts and Operatng Systems (e.g., Mah (1997) found that the Packet Szes for HTTP traffc a heavy-taled dstrbuton). 61
4 Proceedngs of the Tenth Internatonal Network Conference (INC2014) Fgure 1: Relaton between overlappng values and ROC-curve The left part of Fgure 1 shows such grey areas wth the overlappng values wth the correspondng Recever Operatng Characterstc (ROC). The red bell-curve (left) shows values representng normal traffc, the blue bell-curve shows values representng ntrusve traffc. The p-value stands for the proporton of unambguous values (the proporton of non-overlappng areas), that means p s the probablty for a correct classfcaton. The rght sde of Fgure 1 shows the rato of the ROC curve (.e. true and false postve rate ) n relaton to the sze of the grey area (.e. grey area = 1-p) for all possble thresholds n [0,1]. For a mnmal threshold, all traffc s classfed as normal resultng n a pont (0,0) whereas for maxmal threshold all traffc s classfed as abnormal resultng n pont (1,1). The larger the area under the ROC curve (and thus the smaller the grey area), the better s the recognton rate. The ROC curve s a measure for the performance of a classfcaton algorthm (n ths case we classfy traffc as normal or anomalous) and shows the possble combnatons of true postve rate TP/(TP+ FN ) and false postve rate TN /(TN + FP). Dependng on the user preferences t s possble to adjust an Anomaly Detecton System a) more senstve and report even slght devatons from the normal behavour or b) more specfc to report only devatons that are defntely ntrusve. Whle a) leads to more false postves, b) leads to more undetected ntrusve actvtes. Fgure 2: Threshold 62
5 Fgure 2 shows the effect of the threshold. Every value on the left sde of the threshold s classfed as not ntrusve whle every value on the rght sde s classfed as ntrusve the ambguous values n the overlappng area ncluded. The ROC-Cuve shows the correspondng True and False Postve Rates for ths Threshold poston. A ROC curve close to the dagonal lne ndcates a random detecton rate. values close to the dagonal represent a same true and false postve rate, whch corresponds to the expected detecton rate of a random process. The deal ROC curve frst rses vertcally to true postve rate close to 1, whle false postve error rate ntally remans close to 0 before the false postve rate ncreases. We am to reduce the grey area by usng several samples smultaneously. Thus, nose s smoothed and the nfluence of outlers s reduced. The followng part of ths paper ntroduces a smple algorthm derved from Packet Header Anomaly Detecton (PHAD) (Mahoney and Chan 2001) and some features ntroduced n our earler papers whch focused on a correlaton analyss and outler detecton (Hock and Kappes 2013). Our method and features may be also a vald approach detect a wde range of anomales n practse, but our ratonale for ths approach s to evaluate the practcal use of majorty votng and Self-Learnng The Anomaly Detecton Method In our system, traffc s classfed takng nto account the followng features: 1. IP.src.Entropy and Dst.Port.Entropy show the probablty for the observed dstrbuton of IP Source Addresses and Destnaton Ports. For example, a Port scan wth nmap, that calls dfferent ports a sngle tme, generates very small entropy values. Number of Packets to port value = Number of Packets n Entropy= p( value ) log p ( value ) =1 2. Mean.Packet.Sze s the mean-value of all packet szes over a certan tme. It can dstngush certan IP Protocols and detect some attacks wth unusual small or large packet sze. Mean. Packet. Sze= 1 n n Packet. Sze =1 3. Utlzaton s the number of packets over tme. It can be another evdence for Denal of Servce, because many DoS depend on resource exhauston and therefore generate a lot of network traffc. Number of Packets Utlzaton= Tme Usng these features, PHAD determnes the probablty of an anomaly, called anomaly score, based on the number and last tme of prevous occurrences of values. The tradtonal PHAD algorthm looks at the values of Packet Header felds to assgn an anomaly score to each Packet. We look at the values of custom features 63
6 Proceedngs of the Tenth Internatonal Network Conference (INC2014) and assgn an anomaly score to each Tme Wndow nstead. PHAD calculates a probablty for the observaton of each value and then sums all values to an Anomaly Score. We further use a logarthm to adjust the score to a range between 0 and 1. After the anomaly score was calculated for each sample s appled majorty votng. Majorty votng can mprove the probablty of a correct result when there s an ntal probablty hgher than 50% (.e. random). The new probablty majorty votng assumes all examples are equally good. Let p denote the probablty for a correct decson for a sample and assume that p s equal for all samples. The decson accuracy of majorty votng method wth n completely ndependent samples s gven n = Number of tmes the value was seen n tranng r = Unque values n tranng t = Tme snce last occurence t n feature = r score = 0.1log 10 by the bnomal formula: P Total = ((n 1 )/2) = 0 feature n!!(n )! p n (1 p) P Total s the probablty for the correct classfcaton usng majorty votng Fgure 3 shows the total probablty for a correct decson n relaton to the qualty and the number of samples. 64 Fgure 3: Theoretcal mprovement of qualty through ncrease of samples In summary, our productve phase can be broken down nto three smple steps. At frst, we derve our features for the current network traffc. Then we calculate the anomaly score usng each of the learned samples. Each anomaly score hgher then a
7 threshold votes for anomalous and each score smaller then the threshold votes for normal. The majorty of these votes reveals whether the fnal decson for ths tme wndow s anomalous or normal n form of a value from range [0,1]. FnalDecs on = AnomalousVote AnomalousVote+ NormalVote As seen n Fgure 3, the theoretcal mprovement of the qualty, calculated wth the bnomal formula, dmnshes wth the number of samples used. For practcal purposes, we therefore, we use ths amount of samples and f there are more than 15 models, the one wth most false postves s deleted to keep resources and tme consumpton of our method acceptable Update Anomaly Detecton Systems need to adept to the envronment to deal wth the contnuously changng network traffc, the so-called concept drft. The manual defnton and evaluaton of adopted samples would be tme consumng tasks. There s the need for an automatc update mechansm. However, a full replacement of the learned sample mght lead to several problems such as an decrease of the detecton performance due to outler, nose or the unnotced learnng of attacks. Therefore, our approach evaluates dfferent replacement strateges to update the Anomaly Detecton System step by step. The Self-Learnng Process frst adds a new sample generated from the current traffc and then selects a deletes one of the sample to keep the orgnal number of samples. The selecton parameter s defned by the replacement strategy. Some common replacement strateges are: Strategy Descrpton Parameter Replace worst Deletes the sample that performed worst Performance over an evaluaton perod. Replace random Replaces a random sample, f the new Performance sample fulfls a mnmum performance. Replace most smlar Calculates a smlarty measure and replaces Smlarty one of the two most smlar. Replace oldest Replace the sample added frst. chronologcal order Table 2: Overvew of Replacement Strateges Dependng on the replacement strategy, we need to calculate the performance of one or several samples or the smlarty between two samples. We consult the correlaton as smlarty measure: corr n 2 x,y = x x y y / x x y y = 1 n = 1 n =
8 Proceedngs of the Tenth Internatonal Network Conference (INC2014) The performance of a sample s approxmated wth the proporton of values ncluded n the sample. Therefore, there s the need to perform an evaluaton phase and compare the values from the evaluaton phase wth the values ncluded n the sample: Number of values captured by sample Performance= Number of total values 4. Results In order to test the replacement strateges, we set up an experment n whch network traffc was montored over a total perod of 5 hours. The features, as lsted n secton 2.1, were calculated for traffc representng a 10 second tme wndow. Samples were created usng the features from 15 tme wndows. The normal network traffc has been created usng a Wndows PC n a test network wth an Internet connecton. In addton to the generated traffc from Wndows (e.g. ARP, DHCP,..) we executed typcal user actvtes such as web rado, vdeo streamng, browsng and e-mal. Every 100 seconds an IPv6 Router Advertsement Flood was carred out as proxy for denal of servce attacks. A new sample for replacement strateges was offered once Fgure 4: Anomaly Scores over Tme 15 new tme wndows wth Anomaly score < 0.5. were avalable. 66
9 Fgure 4 shows two exemplary chosen replacement strateges over the course of tme. The x-axs shows the course of tme n the form of the score numbers (the traffc s rated n tme slots of 10 seconds), the y-axs ndcates the probablty for a anomaly (gven by the majorty votng). The upper part of the Fgure, s the plot wthout the exchange of samples, and the lower part shows the same experment when the oldest sample s replaced. Whle the black crcles show the score for normal traffc (should always be assessed wth 0), the red trangles show attacks (should always be assessed wth 1). The recognton rate n the upper dagram abruptly decreases after about half the tme (the black cloud of ponts s suddenly more dense n the upper part of the plot). Ths behavour usually occurs when the network behavour changes and the samples get deprecated. The lower dagram wth the replace oldest strategy shows a perod of adjustment where the deprecated samples get replaced by more fttng samples. After ths adaptaton phase, the detecton rate s agan better. The detaled performance of all strateges s shown as a ROC Curve (see Fgure 5). As already descrbed n secton 2, the result of classfcaton methods (.e. anomaly detecton as well), s always a compromse of detecton rate and error rate. Ths compromse can be generally adjusted by a threshold value. A ROC curve shows all possble combnatons of recognton rate and error rate and thereby provdes a better vew as a sngle value. We use the area under curve (AUC) as a numercal qualty measure (see Table 2). An AUC of 1 represents perfect detecton whle an AUC of 0.5 represents completely random results. The experment wthout replacement acheved, as expected, the worst results. "replace oldest" archved the best results. The replace worst strategy mght perform better wth another measure for the sample performance. Fgure 5: Expermental Results for Dfferent Replacement Strateges Ths could be archved by an addtonal evaluaton of each new sample over a perod of tme or feedback by humans. The nfluence of addtonal parameters such as sample sze, replacement frequency or recognton method has not been tested here. However, t s evdent that the replacement strategy can have, ndependent from other parameter, sgnfcant mpact on the qualty of the anomaly detecton. 67
10 Proceedngs of the Tenth Internatonal Network Conference (INC2014) Replacement Strategy AUC No Replacement Oldest Worst Random Most Smlar Table 3: Area under Curve 5. Concluson and Future Work In ths paper, we evaluated Anomaly Detecton n combnaton wth majorty votng by usng several, dynamcally updated traffc samples. Our results strongly ndcate that multple samples reduce nose and outlers. Furthermore, majorty votng decreases false postves through adaptng the system by self-learnng. Our long-term goal s to develop and feld-test a modern Anomaly Detecton System based on the methods outlned n ths paper. We focused on the evaluaton of replacement strateges to for automatc update mechansms and showed that the replacement strategy has mpact on the qualty and can prevent concept drft. The replace oldest strategy archved the best results n our experments. Ths work was supported n part by the German Federal Mnstry of Educaton and Research n scope of grant number 03FH005PA2. Responsble for the content are the authors. 6. References Bachrach, Y., Graepel, T., Kasnec, G., Kosnsk, M. and Gael, J. (2012), "Crowd IQ - Aggregatng Opnons to Boost Performance", In Proc. of the 11th Internatonal Conference on Autonomous Agents and Multagent Systems, Vol. 1, pp Cretu-Cocarle, G.F., Stavrou, A., Locasto, M.E. and Stolfo, S.J. (2009), "Adaptve Anomaly Detecton va Self-Calbraton and Dynamc Updatng", In Proc. Recent Advances n Intruson Detecton, Sprnger, pp Dennng, D.E. (1987), "An ntruson-detecton model", IEEE Transactons on Software Engneerng, pp Dokas, P., Ertoz, L., Kumar, V., Lazarevc, A., Srvastava, J. and Tan, P. (2002), "Data mnng for network ntruson detecton", In Proc. NSF Workshop on Next Generaton Data Mnng, pp Gates, C. and Taylor, C. (2006), "Challengng the anomaly detecton paradgm: a provocatve dscusson", In Proc. of the 2006 workshop on New securty paradgms, ACM, pp Hock, D. and Kappes, M. (2013), "Usng R for anomaly detecton n network traffc", In Proc. ITA 13, Ffth Internatonal Conference on Internet Technologes and Applcatons. Km, J. and Bentley, P.J. (2002), "Towards an Artfcal Immune System for Network Intruson Detecton - An Investgaton of dynamc Clonal Selecton", In Proc. of the 2002 Evolutonary Computaton CEC'02, IEEE, Vol. 2, pp
11 Km, M., Kong, H., Hong, S., Chung, S. and Hong, J.W. (2004), "A flow-based method for abnormal network traffc detecton", In Proc. NOMS 2004, A Network Operatons and Management Symposum, IEEE/I-FIP, Vol. 1, pp Kloft, M. and Laskov, P. (2007), "A posonng attack aganst onlne anomaly detecton", In Proc. NIPS Workshop on Machne Learnng n Adversaral Envronments for Computer Securty. Kruegel, C., Valeur, F. and Vgna, G. (2005), "Intruson detecton and correlaton: challenges and solutons", Sprnger, Vol. 14. Mah, B.A. (1997), "An emprcal model of HTTP network traffc", In Proc. INFOCOM'97, IEEE, Vol. 2, pp Mahoney, M. and Chan, P.K. (2001), "PHAD: Packet header anomaly detecton for dentfyng hostle network traffc", Florda Insttute of Technology techncal report, pp1-17. Munz, G. and Carle, G. (2007), "Real-tme analyss of flow data for network attack detecton", In Proc. IM'07, 10th IFIP/IEEE Internatonal Symposum on Integrated Network Management, IEEE, pp Petraszek, T. (2004), "Usng adaptve alert classfcaton to reduce false postves n ntruson detecton", In Proc. Recent Advances n Intruson Detecton, Sprnger, pp Rchardson, R. (2011), "CSI computer crme and securty survey" 69
A Binarization Algorithm specialized on Document Images and Photos
A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a
More informationUser Authentication Based On Behavioral Mouse Dynamics Biometrics
User Authentcaton Based On Behavoral Mouse Dynamcs Bometrcs Chee-Hyung Yoon Danel Donghyun Km Department of Computer Scence Department of Computer Scence Stanford Unversty Stanford Unversty Stanford, CA
More informationLearning the Kernel Parameters in Kernel Minimum Distance Classifier
Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department
More informationContent Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers
IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth
More informationAvailable online at Available online at Advanced in Control Engineering and Information Science
Avalable onlne at wwwscencedrectcom Avalable onlne at wwwscencedrectcom Proceda Proceda Engneerng Engneerng 00 (2011) 15000 000 (2011) 1642 1646 Proceda Engneerng wwwelsevercom/locate/proceda Advanced
More informationTerm Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task
Proceedngs of NTCIR-6 Workshop Meetng, May 15-18, 2007, Tokyo, Japan Term Weghtng Classfcaton System Usng the Ch-square Statstc for the Classfcaton Subtask at NTCIR-6 Patent Retreval Task Kotaro Hashmoto
More informationCluster Analysis of Electrical Behavior
Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School
More informationDetermining the Optimal Bandwidth Based on Multi-criterion Fusion
Proceedngs of 01 4th Internatonal Conference on Machne Learnng and Computng IPCSIT vol. 5 (01) (01) IACSIT Press, Sngapore Determnng the Optmal Bandwdth Based on Mult-crteron Fuson Ha-L Lang 1+, Xan-Mn
More informationImprovement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration
Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,
More informationThe Research of Support Vector Machine in Agricultural Data Classification
The Research of Support Vector Machne n Agrcultural Data Classfcaton Le Sh, Qguo Duan, Xnmng Ma, Me Weng College of Informaton and Management Scence, HeNan Agrcultural Unversty, Zhengzhou 45000 Chna Zhengzhou
More informationSubspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points;
Subspace clusterng Clusterng Fundamental to all clusterng technques s the choce of dstance measure between data ponts; D q ( ) ( ) 2 x x = x x, j k = 1 k jk Squared Eucldean dstance Assumpton: All features
More informationNeural Networks in Statistical Anomaly Intrusion Detection
Neural Networks n Statstcal Anomaly Intruson Detecton ZHENG ZHANG, JUN LI, C. N. MANIKOPOULOS, JAY JORGENSON and JOSE UCLES ECE Department, New Jersey Inst. of Tech., Unversty Heghts, Newark, NJ 72, USA
More informationAn Optimal Algorithm for Prufer Codes *
J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,
More informationFeature Reduction and Selection
Feature Reducton and Selecton Dr. Shuang LIANG School of Software Engneerng TongJ Unversty Fall, 2012 Today s Topcs Introducton Problems of Dmensonalty Feature Reducton Statstc methods Prncpal Components
More informationFuzzy Modeling of the Complexity vs. Accuracy Trade-off in a Sequential Two-Stage Multi-Classifier System
Fuzzy Modelng of the Complexty vs. Accuracy Trade-off n a Sequental Two-Stage Mult-Classfer System MARK LAST 1 Department of Informaton Systems Engneerng Ben-Guron Unversty of the Negev Beer-Sheva 84105
More informationA Fast Visual Tracking Algorithm Based on Circle Pixels Matching
A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng
More informationCompiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz
Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster
More informationAutomated Selection of Training Data and Base Models for Data Stream Mining Using Naïve Bayes Ensemble Classification
Proceedngs of the World Congress on Engneerng 2017 Vol II, July 5-7, 2017, London, U.K. Automated Selecton of Tranng Data and Base Models for Data Stream Mnng Usng Naïve Bayes Ensemble Classfcaton Patrca
More informationTECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS. Muradaliyev A.Z.
TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS Muradalyev AZ Azerbajan Scentfc-Research and Desgn-Prospectng Insttute of Energetc AZ1012, Ave HZardab-94 E-mal:aydn_murad@yahoocom Importance of
More informationComplex Numbers. Now we also saw that if a and b were both positive then ab = a b. For a second let s forget that restriction and do the following.
Complex Numbers The last topc n ths secton s not really related to most of what we ve done n ths chapter, although t s somewhat related to the radcals secton as we wll see. We also won t need the materal
More informationData Mining: Model Evaluation
Data Mnng: Model Evaluaton Aprl 16, 2013 1 Issues: Evaluatng Classfcaton Methods Accurac classfer accurac: predctng class label predctor accurac: guessng value of predcted attrbutes Speed tme to construct
More informationSupport Vector Machines
/9/207 MIST.6060 Busness Intellgence and Data Mnng What are Support Vector Machnes? Support Vector Machnes Support Vector Machnes (SVMs) are supervsed learnng technques that analyze data and recognze patterns.
More informationWishing you all a Total Quality New Year!
Total Qualty Management and Sx Sgma Post Graduate Program 214-15 Sesson 4 Vnay Kumar Kalakband Assstant Professor Operatons & Systems Area 1 Wshng you all a Total Qualty New Year! Hope you acheve Sx sgma
More informationHelsinki University Of Technology, Systems Analysis Laboratory Mat Independent research projects in applied mathematics (3 cr)
Helsnk Unversty Of Technology, Systems Analyss Laboratory Mat-2.08 Independent research projects n appled mathematcs (3 cr) "! #$&% Antt Laukkanen 506 R ajlaukka@cc.hut.f 2 Introducton...3 2 Multattrbute
More informationMathematics 256 a course in differential equations for engineering students
Mathematcs 56 a course n dfferental equatons for engneerng students Chapter 5. More effcent methods of numercal soluton Euler s method s qute neffcent. Because the error s essentally proportonal to the
More informationFEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur
FEATURE EXTRACTION Dr. K.Vjayarekha Assocate Dean School of Electrcal and Electroncs Engneerng SASTRA Unversty, Thanjavur613 41 Jont Intatve of IITs and IISc Funded by MHRD Page 1 of 8 Table of Contents
More informationX- Chart Using ANOM Approach
ISSN 1684-8403 Journal of Statstcs Volume 17, 010, pp. 3-3 Abstract X- Chart Usng ANOM Approach Gullapall Chakravarth 1 and Chaluvad Venkateswara Rao Control lmts for ndvdual measurements (X) chart are
More informationLearning-based License Plate Detection on Edge Features
Learnng-based Lcense Plate Detecton on Edge Features Wng Teng Ho, Woo Hen Yap, Yong Haur Tay Computer Vson and Intellgent Systems (CVIS) Group Unverst Tunku Abdul Rahman, Malaysa wngteng_h@yahoo.com, woohen@yahoo.com,
More informationMeta-heuristics for Multidimensional Knapsack Problems
2012 4th Internatonal Conference on Computer Research and Development IPCSIT vol.39 (2012) (2012) IACSIT Press, Sngapore Meta-heurstcs for Multdmensonal Knapsack Problems Zhbao Man + Computer Scence Department,
More informationVirtual Machine Migration based on Trust Measurement of Computer Node
Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on
More informationNetwork Intrusion Detection Based on PSO-SVM
TELKOMNIKA Indonesan Journal of Electrcal Engneerng Vol.1, No., February 014, pp. 150 ~ 1508 DOI: http://dx.do.org/10.11591/telkomnka.v1.386 150 Network Intruson Detecton Based on PSO-SVM Changsheng Xang*
More informationProblem Definitions and Evaluation Criteria for Computational Expensive Optimization
Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty
More informationAbstract. 1. Introduction
One-Class Tranng for Masquerade Detecton Ke Wang Salvatore J. Stolfo Computer Scence Department, Columba Unversty 500 West 20 th Street, New York, NY, 0027 {kewang, sal}@cs.columba.edu Abstract We extend
More informationMULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION
MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION Paulo Quntlano 1 & Antono Santa-Rosa 1 Federal Polce Department, Brasla, Brazl. E-mals: quntlano.pqs@dpf.gov.br and
More informationA Lazy Ensemble Learning Method to Classification
IJCSI Internatonal Journal of Computer Scence Issues, Vol. 7, Issue 5, September 2010 ISSN (Onlne): 1694-0814 344 A Lazy Ensemble Learnng Method to Classfcaton Haleh Homayoun 1, Sattar Hashem 2 and Al
More informationClassifying Acoustic Transient Signals Using Artificial Intelligence
Classfyng Acoustc Transent Sgnals Usng Artfcal Intellgence Steve Sutton, Unversty of North Carolna At Wlmngton (suttons@charter.net) Greg Huff, Unversty of North Carolna At Wlmngton (jgh7476@uncwl.edu)
More informationAn Entropy-Based Approach to Integrated Information Needs Assessment
Dstrbuton Statement A: Approved for publc release; dstrbuton s unlmted. An Entropy-Based Approach to ntegrated nformaton Needs Assessment June 8, 2004 Wllam J. Farrell Lockheed Martn Advanced Technology
More informationSLAM Summer School 2006 Practical 2: SLAM using Monocular Vision
SLAM Summer School 2006 Practcal 2: SLAM usng Monocular Vson Javer Cvera, Unversty of Zaragoza Andrew J. Davson, Imperal College London J.M.M Montel, Unversty of Zaragoza. josemar@unzar.es, jcvera@unzar.es,
More informationLecture 5: Multilayer Perceptrons
Lecture 5: Multlayer Perceptrons Roger Grosse 1 Introducton So far, we ve only talked about lnear models: lnear regresson and lnear bnary classfers. We noted that there are functons that can t be represented
More informationReducing Frame Rate for Object Tracking
Reducng Frame Rate for Object Trackng Pavel Korshunov 1 and We Tsang Oo 2 1 Natonal Unversty of Sngapore, Sngapore 11977, pavelkor@comp.nus.edu.sg 2 Natonal Unversty of Sngapore, Sngapore 11977, oowt@comp.nus.edu.sg
More informationConcurrent Apriori Data Mining Algorithms
Concurrent Apror Data Mnng Algorthms Vassl Halatchev Department of Electrcal Engneerng and Computer Scence York Unversty, Toronto October 8, 2015 Outlne Why t s mportant Introducton to Assocaton Rule Mnng
More informationAn Evolvable Clustering Based Algorithm to Learn Distance Function for Supervised Environment
IJCSI Internatonal Journal of Computer Scence Issues, Vol. 7, Issue 5, September 2010 ISSN (Onlne): 1694-0814 www.ijcsi.org 374 An Evolvable Clusterng Based Algorthm to Learn Dstance Functon for Supervsed
More informationA mathematical programming approach to the analysis, design and scheduling of offshore oilfields
17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and
More informationIP Camera Configuration Software Instruction Manual
IP Camera 9483 - Confguraton Software Instructon Manual VBD 612-4 (10.14) Dear Customer, Wth your purchase of ths IP Camera, you have chosen a qualty product manufactured by RADEMACHER. Thank you for the
More informationTN348: Openlab Module - Colocalization
TN348: Openlab Module - Colocalzaton Topc The Colocalzaton module provdes the faclty to vsualze and quantfy colocalzaton between pars of mages. The Colocalzaton wndow contans a prevew of the two mages
More informationR s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes
SPH3UW Unt 7.3 Sphercal Concave Mrrors Page 1 of 1 Notes Physcs Tool box Concave Mrror If the reflectng surface takes place on the nner surface of the sphercal shape so that the centre of the mrror bulges
More informationA MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS
Proceedngs of the Wnter Smulaton Conference M E Kuhl, N M Steger, F B Armstrong, and J A Jones, eds A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Mark W Brantley Chun-Hung
More informationSURFACE PROFILE EVALUATION BY FRACTAL DIMENSION AND STATISTIC TOOLS USING MATLAB
SURFACE PROFILE EVALUATION BY FRACTAL DIMENSION AND STATISTIC TOOLS USING MATLAB V. Hotař, A. Hotař Techncal Unversty of Lberec, Department of Glass Producng Machnes and Robotcs, Department of Materal
More informationOptimizing Document Scoring for Query Retrieval
Optmzng Document Scorng for Query Retreval Brent Ellwen baellwe@cs.stanford.edu Abstract The goal of ths project was to automate the process of tunng a document query engne. Specfcally, I used machne learnng
More informationJournal of Process Control
Journal of Process Control (0) 738 750 Contents lsts avalable at ScVerse ScenceDrect Journal of Process Control j ourna l ho me pag e: wwwelsevercom/locate/jprocont Decentralzed fault detecton and dagnoss
More informationSimulation Based Analysis of FAST TCP using OMNET++
Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months
More informationMachine Learning. Topic 6: Clustering
Machne Learnng Topc 6: lusterng lusterng Groupng data nto (hopefully useful) sets. Thngs on the left Thngs on the rght Applcatons of lusterng Hypothess Generaton lusters mght suggest natural groups. Hypothess
More informationSupport Vector Machines
Support Vector Machnes Decson surface s a hyperplane (lne n 2D) n feature space (smlar to the Perceptron) Arguably, the most mportant recent dscovery n machne learnng In a nutshell: map the data to a predetermned
More informationQuery Clustering Using a Hybrid Query Similarity Measure
Query clusterng usng a hybrd query smlarty measure Fu. L., Goh, D.H., & Foo, S. (2004). WSEAS Transacton on Computers, 3(3), 700-705. Query Clusterng Usng a Hybrd Query Smlarty Measure Ln Fu, Don Hoe-Lan
More information3D vector computer graphics
3D vector computer graphcs Paolo Varagnolo: freelance engneer Padova Aprl 2016 Prvate Practce ----------------------------------- 1. Introducton Vector 3D model representaton n computer graphcs requres
More informationClassifier Selection Based on Data Complexity Measures *
Classfer Selecton Based on Data Complexty Measures * Edth Hernández-Reyes, J.A. Carrasco-Ochoa, and J.Fco. Martínez-Trndad Natonal Insttute for Astrophyscs, Optcs and Electroncs, Lus Enrque Erro No.1 Sta.
More informationMachine Learning: Algorithms and Applications
14/05/1 Machne Learnng: Algorthms and Applcatons Florano Zn Free Unversty of Bozen-Bolzano Faculty of Computer Scence Academc Year 011-01 Lecture 10: 14 May 01 Unsupervsed Learnng cont Sldes courtesy of
More informationAn Improved Neural Network Algorithm for Classifying the Transmission Line Faults
1 An Improved Neural Network Algorthm for Classfyng the Transmsson Lne Faults S. Vaslc, Student Member, IEEE, M. Kezunovc, Fellow, IEEE Abstract--Ths study ntroduces a new concept of artfcal ntellgence
More informationStudy of Data Stream Clustering Based on Bio-inspired Model
, pp.412-418 http://dx.do.org/10.14257/astl.2014.53.86 Study of Data Stream lusterng Based on Bo-nspred Model Yngme L, Mn L, Jngbo Shao, Gaoyang Wang ollege of omputer Scence and Informaton Engneerng,
More informationOutline. Type of Machine Learning. Examples of Application. Unsupervised Learning
Outlne Artfcal Intellgence and ts applcatons Lecture 8 Unsupervsed Learnng Professor Danel Yeung danyeung@eee.org Dr. Patrck Chan patrckchan@eee.org South Chna Unversty of Technology, Chna Introducton
More informationFast Feature Value Searching for Face Detection
Vol., No. 2 Computer and Informaton Scence Fast Feature Value Searchng for Face Detecton Yunyang Yan Department of Computer Engneerng Huayn Insttute of Technology Hua an 22300, Chna E-mal: areyyyke@63.com
More informationFeature Selection as an Improving Step for Decision Tree Construction
2009 Internatonal Conference on Machne Learnng and Computng IPCSIT vol.3 (2011) (2011) IACSIT Press, Sngapore Feature Selecton as an Improvng Step for Decson Tree Constructon Mahd Esmael 1, Fazekas Gabor
More informationLoad-Balanced Anycast Routing
Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance
More informationCollaboratively Regularized Nearest Points for Set Based Recognition
Academc Center for Computng and Meda Studes, Kyoto Unversty Collaboratvely Regularzed Nearest Ponts for Set Based Recognton Yang Wu, Mchhko Mnoh, Masayuk Mukunok Kyoto Unversty 9/1/013 BMVC 013 @ Brstol,
More informationIntelligent Information Acquisition for Improved Clustering
Intellgent Informaton Acquston for Improved Clusterng Duy Vu Unversty of Texas at Austn duyvu@cs.utexas.edu Mkhal Blenko Mcrosoft Research mblenko@mcrosoft.com Prem Melvlle IBM T.J. Watson Research Center
More informationDetection of an Object by using Principal Component Analysis
Detecton of an Object by usng Prncpal Component Analyss 1. G. Nagaven, 2. Dr. T. Sreenvasulu Reddy 1. M.Tech, Department of EEE, SVUCE, Trupath, Inda. 2. Assoc. Professor, Department of ECE, SVUCE, Trupath,
More informationAssignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009.
Farrukh Jabeen Algorthms 51 Assgnment #2 Due Date: June 15, 29. Assgnment # 2 Chapter 3 Dscrete Fourer Transforms Implement the FFT for the DFT. Descrbed n sectons 3.1 and 3.2. Delverables: 1. Concse descrpton
More informationTHE PATH PLANNING ALGORITHM AND SIMULATION FOR MOBILE ROBOT
Journal of Theoretcal and Appled Informaton Technology 30 th Aprl 013. Vol. 50 No.3 005-013 JATIT & LLS. All rghts reserved. ISSN: 199-8645 www.jatt.org E-ISSN: 1817-3195 THE PATH PLANNING ALGORITHM AND
More informationA Fast Content-Based Multimedia Retrieval Technique Using Compressed Data
A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,
More informationA MODIFIED K-NEAREST NEIGHBOR CLASSIFIER TO DEAL WITH UNBALANCED CLASSES
A MODIFIED K-NEAREST NEIGHBOR CLASSIFIER TO DEAL WITH UNBALANCED CLASSES Aram AlSuer, Ahmed Al-An and Amr Atya 2 Faculty of Engneerng and Informaton Technology, Unversty of Technology, Sydney, Australa
More informationSkew Angle Estimation and Correction of Hand Written, Textual and Large areas of Non-Textual Document Images: A Novel Approach
Angle Estmaton and Correcton of Hand Wrtten, Textual and Large areas of Non-Textual Document Images: A Novel Approach D.R.Ramesh Babu Pyush M Kumat Mahesh D Dhannawat PES Insttute of Technology Research
More informationTsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance
Tsnghua Unversty at TAC 2009: Summarzng Mult-documents by Informaton Dstance Chong Long, Mnle Huang, Xaoyan Zhu State Key Laboratory of Intellgent Technology and Systems, Tsnghua Natonal Laboratory for
More informationOnline Detection and Classification of Moving Objects Using Progressively Improving Detectors
Onlne Detecton and Classfcaton of Movng Objects Usng Progressvely Improvng Detectors Omar Javed Saad Al Mubarak Shah Computer Vson Lab School of Computer Scence Unversty of Central Florda Orlando, FL 32816
More informationAn Image Fusion Approach Based on Segmentation Region
Rong Wang, L-Qun Gao, Shu Yang, Yu-Hua Cha, and Yan-Chun Lu An Image Fuson Approach Based On Segmentaton Regon An Image Fuson Approach Based on Segmentaton Regon Rong Wang, L-Qun Gao, Shu Yang 3, Yu-Hua
More informationFor instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1)
Secton 1.2 Subsets and the Boolean operatons on sets If every element of the set A s an element of the set B, we say that A s a subset of B, or that A s contaned n B, or that B contans A, and we wrte A
More informationBOOSTING CLASSIFICATION ACCURACY WITH SAMPLES CHOSEN FROM A VALIDATION SET
1 BOOSTING CLASSIFICATION ACCURACY WITH SAMPLES CHOSEN FROM A VALIDATION SET TZU-CHENG CHUANG School of Electrcal and Computer Engneerng, Purdue Unversty, West Lafayette, Indana 47907 SAUL B. GELFAND School
More informationBAYESIAN MULTI-SOURCE DOMAIN ADAPTATION
BAYESIAN MULTI-SOURCE DOMAIN ADAPTATION SHI-LIANG SUN, HONG-LEI SHI Department of Computer Scence and Technology, East Chna Normal Unversty 500 Dongchuan Road, Shangha 200241, P. R. Chna E-MAIL: slsun@cs.ecnu.edu.cn,
More informationAdvanced Computer Networks
Char of Network Archtectures and Servces Department of Informatcs Techncal Unversty of Munch Note: Durng the attendance check a stcker contanng a unque QR code wll be put on ths exam. Ths QR code contans
More informationPerformance Evaluation of Information Retrieval Systems
Why System Evaluaton? Performance Evaluaton of Informaton Retreval Systems Many sldes n ths secton are adapted from Prof. Joydeep Ghosh (UT ECE) who n turn adapted them from Prof. Dk Lee (Unv. of Scence
More informationComplex System Reliability Evaluation using Support Vector Machine for Incomplete Data-set
Internatonal Journal of Performablty Engneerng, Vol. 7, No. 1, January 2010, pp.32-42. RAMS Consultants Prnted n Inda Complex System Relablty Evaluaton usng Support Vector Machne for Incomplete Data-set
More informationScheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research
Schedulng Remote Access to Scentfc Instruments n Cybernfrastructure for Educaton and Research Je Yn 1, Junwe Cao 2,3,*, Yuexuan Wang 4, Lanchen Lu 1,3 and Cheng Wu 1,3 1 Natonal CIMS Engneerng and Research
More informationCS 534: Computer Vision Model Fitting
CS 534: Computer Vson Model Fttng Sprng 004 Ahmed Elgammal Dept of Computer Scence CS 534 Model Fttng - 1 Outlnes Model fttng s mportant Least-squares fttng Maxmum lkelhood estmaton MAP estmaton Robust
More informationSHAPE RECOGNITION METHOD BASED ON THE k-nearest NEIGHBOR RULE
SHAPE RECOGNITION METHOD BASED ON THE k-nearest NEIGHBOR RULE Dorna Purcaru Faculty of Automaton, Computers and Electroncs Unersty of Craoa 13 Al. I. Cuza Street, Craoa RO-1100 ROMANIA E-mal: dpurcaru@electroncs.uc.ro
More informationEnhancement of Infrequent Purchased Product Recommendation Using Data Mining Techniques
Enhancement of Infrequent Purchased Product Recommendaton Usng Data Mnng Technques Noraswalza Abdullah, Yue Xu, Shlomo Geva, and Mark Loo Dscplne of Computer Scence Faculty of Scence and Technology Queensland
More informationThe Codesign Challenge
ECE 4530 Codesgn Challenge Fall 2007 Hardware/Software Codesgn The Codesgn Challenge Objectves In the codesgn challenge, your task s to accelerate a gven software reference mplementaton as fast as possble.
More informationA Unified Framework for Semantics and Feature Based Relevance Feedback in Image Retrieval Systems
A Unfed Framework for Semantcs and Feature Based Relevance Feedback n Image Retreval Systems Ye Lu *, Chunhu Hu 2, Xngquan Zhu 3*, HongJang Zhang 2, Qang Yang * School of Computng Scence Smon Fraser Unversty
More informationS1 Note. Basis functions.
S1 Note. Bass functons. Contents Types of bass functons...1 The Fourer bass...2 B-splne bass...3 Power and type I error rates wth dfferent numbers of bass functons...4 Table S1. Smulaton results of type
More informationDynamic Camera Assignment and Handoff
12 Dynamc Camera Assgnment and Handoff Br Bhanu and Ymng L 12.1 Introducton...338 12.2 Techncal Approach...339 12.2.1 Motvaton and Problem Formulaton...339 12.2.2 Game Theoretc Framework...339 12.2.2.1
More informationOutline. Discriminative classifiers for image recognition. Where in the World? A nearest neighbor recognition example 4/14/2011. CS 376 Lecture 22 1
4/14/011 Outlne Dscrmnatve classfers for mage recognton Wednesday, Aprl 13 Krsten Grauman UT-Austn Last tme: wndow-based generc obect detecton basc ppelne face detecton wth boostng as case study Today:
More informationUsing Neural Networks and Support Vector Machines in Data Mining
Usng eural etworks and Support Vector Machnes n Data Mnng RICHARD A. WASIOWSKI Computer Scence Department Calforna State Unversty Domnguez Hlls Carson, CA 90747 USA Abstract: - Multvarate data analyss
More informationParallelism for Nested Loops with Non-uniform and Flow Dependences
Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr
More informationGENETIC ALGORITHMS APPLIED FOR PATTERN GENERATION FOR DOWNHOLE DYNAMOMETER CARDS
GENETIC ALGORITHMS APPLIED FOR PATTERN GENERATION FOR DOWNHOLE DYNAMOMETER CARDS L. Schntman 1 ; B.C.Brandao 1 ; H.Lepkson 1 ; J.A.M. Felppe de Souza 2 ; J.F.S.Correa 3 1 Unversdade Federal da Baha- Brazl
More informationNetwork Coding as a Dynamical System
Network Codng as a Dynamcal System Narayan B. Mandayam IEEE Dstngushed Lecture (jont work wth Dan Zhang and a Su) Department of Electrcal and Computer Engneerng Rutgers Unversty Outlne. Introducton 2.
More informationA User Selection Method in Advertising System
Int. J. Communcatons, etwork and System Scences, 2010, 3, 54-58 do:10.4236/jcns.2010.31007 Publshed Onlne January 2010 (http://www.scrp.org/journal/jcns/). A User Selecton Method n Advertsng System Shy
More informationCHAPTER 3 SEQUENTIAL MINIMAL OPTIMIZATION TRAINED SUPPORT VECTOR CLASSIFIER FOR CANCER PREDICTION
48 CHAPTER 3 SEQUENTIAL MINIMAL OPTIMIZATION TRAINED SUPPORT VECTOR CLASSIFIER FOR CANCER PREDICTION 3.1 INTRODUCTION The raw mcroarray data s bascally an mage wth dfferent colors ndcatng hybrdzaton (Xue
More information6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour
6.854 Advanced Algorthms Petar Maymounkov Problem Set 11 (November 23, 2005) Wth: Benjamn Rossman, Oren Wemann, and Pouya Kheradpour Problem 1. We reduce vertex cover to MAX-SAT wth weghts, such that the
More informationAn IPv6-Oriented IDS Framework and Solutions of Two Problems
An IPv6-Orented IDS Framework and Solutons of Two Problems We LI, Zhy FANG, Peng XU and ayang SI,2 School of Computer Scence and Technology, Jln Unversty Changchun, 3002, P.R.Chna 2 Graduate Unversty of
More informationPrivate Information Retrieval (PIR)
2 Levente Buttyán Problem formulaton Alce wants to obtan nformaton from a database, but she does not want the database to learn whch nformaton she wanted e.g., Alce s an nvestor queryng a stock-market
More informationVideo Proxy System for a Large-scale VOD System (DINA)
Vdeo Proxy System for a Large-scale VOD System (DINA) KWUN-CHUNG CHAN #, KWOK-WAI CHEUNG *# #Department of Informaton Engneerng *Centre of Innovaton and Technology The Chnese Unversty of Hong Kong SHATIN,
More informationAnalysis of Continuous Beams in General
Analyss of Contnuous Beams n General Contnuous beams consdered here are prsmatc, rgdly connected to each beam segment and supported at varous ponts along the beam. onts are selected at ponts of support,
More information